Download, print and study this document offline |
Page 1 Sample Question Paper (Term 1) Class: X Session: 2021-22 Computer Applications (Code 165) Maximum Marks: 25 Time Allowed: 90 Minutes General Instructions: 1. The Question Paper contains three sections A, B and C. 2. Section A has 20 questions. Attempt any 16 questions. 3. Section B has 20 questions. Attempt any 16 questions. 4. Section C has 10 questions. Attempt any 8 questions. 5. All questions carry equal marks. 6. There is no negative marking. Q.N. Section-A This section consists of 20 questions of MCQ type. Answer any 16 questions. 1 Which one of the following software comes under Open-Source Software category? a. Photoshop b. Ms-Paint c. Linux d. Windows 2 HTML tag to draw horizontal line: a. <hl> b. <hr> c. <hline> d. None of the above 3 Secure data transmission means a) Data is accessible by any unauthorized person during transmission. b) Data can not be accessed by any unauthorized person during transmission. c) Transmission of data happens easily d) Noone can access it 4 The correct HTML code to display(P+Q) 2 is: a. <SUB>(P+) 2</SUB> b. P+Q <SUP> 2 </SUP> c. ( P + Q)<SUP> 2 </SUP> d. <SUP> (P+Q) 2</SUP> 5 Which HTML tags cause browsers to render text as italics? a. <text style = “italics”></text> b. <ital.></ital.> c. <i></i> d. <b></b> 6 The correct HTML code for inserting an image is : a. <img href=”image.gif”> b. <img> image.gif</gif> c. <image src = “image.gif”> d. <img src = “image.gif” > Page 2 Sample Question Paper (Term 1) Class: X Session: 2021-22 Computer Applications (Code 165) Maximum Marks: 25 Time Allowed: 90 Minutes General Instructions: 1. The Question Paper contains three sections A, B and C. 2. Section A has 20 questions. Attempt any 16 questions. 3. Section B has 20 questions. Attempt any 16 questions. 4. Section C has 10 questions. Attempt any 8 questions. 5. All questions carry equal marks. 6. There is no negative marking. Q.N. Section-A This section consists of 20 questions of MCQ type. Answer any 16 questions. 1 Which one of the following software comes under Open-Source Software category? a. Photoshop b. Ms-Paint c. Linux d. Windows 2 HTML tag to draw horizontal line: a. <hl> b. <hr> c. <hline> d. None of the above 3 Secure data transmission means a) Data is accessible by any unauthorized person during transmission. b) Data can not be accessed by any unauthorized person during transmission. c) Transmission of data happens easily d) Noone can access it 4 The correct HTML code to display(P+Q) 2 is: a. <SUB>(P+) 2</SUB> b. P+Q <SUP> 2 </SUP> c. ( P + Q)<SUP> 2 </SUP> d. <SUP> (P+Q) 2</SUP> 5 Which HTML tags cause browsers to render text as italics? a. <text style = “italics”></text> b. <ital.></ital.> c. <i></i> d. <b></b> 6 The correct HTML code for inserting an image is : a. <img href=”image.gif”> b. <img> image.gif</gif> c. <image src = “image.gif”> d. <img src = “image.gif” > 7 Which attribute is NOT valid for the <body> tag? a. background b. color c. vlink d. bgcolor 8 ____________attribute is used to specify the location of an image file. a. alt b. src c. align d. name 9 Which of the following is NOT an example of Intellectual Property rights? a. Patent b. Trademark c. Password d. Industrial Design 10 The_________ attribute of <img> tag specifies an alternate text for an image, if the image cannot be displayed due to any reason. a. alt b. alternate c. tooltip d. text 11 While creating a Web document, which unit is used to express an image’s height and width? a. Centimeters b. Pixels c. Dots per inch d. Inches 12 Preeti needs to send a very confidential message to her colleague in office over a secure channel. She uses a technique wherein an actual message (which is in readable form) can be converted into an unreadable message. This concept is known as________________ a. Encryption b. Decryption c. Plagiarism d. Data Security. 13 Which is the correct way to comment out something in HTML? a. Using ## and # b. Using <!-- and --> c. Using </-- and -/-> d. Using <!-- and -!> 14 The default alignment of images, that are inserted in Web page, is: a. left b. right c. inline with text d. middle 15 Which of the following techniques can be used for security of data? a. Authentication b. Authorisation c. Encryption d. All of the Above Page 3 Sample Question Paper (Term 1) Class: X Session: 2021-22 Computer Applications (Code 165) Maximum Marks: 25 Time Allowed: 90 Minutes General Instructions: 1. The Question Paper contains three sections A, B and C. 2. Section A has 20 questions. Attempt any 16 questions. 3. Section B has 20 questions. Attempt any 16 questions. 4. Section C has 10 questions. Attempt any 8 questions. 5. All questions carry equal marks. 6. There is no negative marking. Q.N. Section-A This section consists of 20 questions of MCQ type. Answer any 16 questions. 1 Which one of the following software comes under Open-Source Software category? a. Photoshop b. Ms-Paint c. Linux d. Windows 2 HTML tag to draw horizontal line: a. <hl> b. <hr> c. <hline> d. None of the above 3 Secure data transmission means a) Data is accessible by any unauthorized person during transmission. b) Data can not be accessed by any unauthorized person during transmission. c) Transmission of data happens easily d) Noone can access it 4 The correct HTML code to display(P+Q) 2 is: a. <SUB>(P+) 2</SUB> b. P+Q <SUP> 2 </SUP> c. ( P + Q)<SUP> 2 </SUP> d. <SUP> (P+Q) 2</SUP> 5 Which HTML tags cause browsers to render text as italics? a. <text style = “italics”></text> b. <ital.></ital.> c. <i></i> d. <b></b> 6 The correct HTML code for inserting an image is : a. <img href=”image.gif”> b. <img> image.gif</gif> c. <image src = “image.gif”> d. <img src = “image.gif” > 7 Which attribute is NOT valid for the <body> tag? a. background b. color c. vlink d. bgcolor 8 ____________attribute is used to specify the location of an image file. a. alt b. src c. align d. name 9 Which of the following is NOT an example of Intellectual Property rights? a. Patent b. Trademark c. Password d. Industrial Design 10 The_________ attribute of <img> tag specifies an alternate text for an image, if the image cannot be displayed due to any reason. a. alt b. alternate c. tooltip d. text 11 While creating a Web document, which unit is used to express an image’s height and width? a. Centimeters b. Pixels c. Dots per inch d. Inches 12 Preeti needs to send a very confidential message to her colleague in office over a secure channel. She uses a technique wherein an actual message (which is in readable form) can be converted into an unreadable message. This concept is known as________________ a. Encryption b. Decryption c. Plagiarism d. Data Security. 13 Which is the correct way to comment out something in HTML? a. Using ## and # b. Using <!-- and --> c. Using </-- and -/-> d. Using <!-- and -!> 14 The default alignment of images, that are inserted in Web page, is: a. left b. right c. inline with text d. middle 15 Which of the following techniques can be used for security of data? a. Authentication b. Authorisation c. Encryption d. All of the Above 16 Which of the following is not a cybercrime? a. Plagiarism b. Phishing c. using licensed software d. hacking 17 _________ is a software for which exclusive rights of modification in the source code remain with the owner. a. Free Open-Source Software b. Freeware c. Open-Source Software d. Proprietary Software 18. A _______________ is the right given by the government to an inventor to protect his/ her invention from being used/copied for a fixed period of time. a. Copyright b. Intellectual Property c. Patent d. Trademark 19 Which of these is NOT an attribute of the font tag? a. color b. face c. type d. size 20 The <_________> tag displays text in subscript form. a. sub b. sup c. sups d. subs. Section-B This section contains 20 questions. Answer any 16 questions. 21 Arun clicks on a link received in a message on his phone which promises him a complimentary trip to a destination of his choice. He forwarded this message to his friend, Panshul and asked him to do the same. But Panshul refuses and tells Arun that his personal and private information, such as online account names, login information and passwords can be stolen and he should be careful of such ____________ attacks. a. Phishing b. Spamming c. Scamming d. Plagiarism Page 4 Sample Question Paper (Term 1) Class: X Session: 2021-22 Computer Applications (Code 165) Maximum Marks: 25 Time Allowed: 90 Minutes General Instructions: 1. The Question Paper contains three sections A, B and C. 2. Section A has 20 questions. Attempt any 16 questions. 3. Section B has 20 questions. Attempt any 16 questions. 4. Section C has 10 questions. Attempt any 8 questions. 5. All questions carry equal marks. 6. There is no negative marking. Q.N. Section-A This section consists of 20 questions of MCQ type. Answer any 16 questions. 1 Which one of the following software comes under Open-Source Software category? a. Photoshop b. Ms-Paint c. Linux d. Windows 2 HTML tag to draw horizontal line: a. <hl> b. <hr> c. <hline> d. None of the above 3 Secure data transmission means a) Data is accessible by any unauthorized person during transmission. b) Data can not be accessed by any unauthorized person during transmission. c) Transmission of data happens easily d) Noone can access it 4 The correct HTML code to display(P+Q) 2 is: a. <SUB>(P+) 2</SUB> b. P+Q <SUP> 2 </SUP> c. ( P + Q)<SUP> 2 </SUP> d. <SUP> (P+Q) 2</SUP> 5 Which HTML tags cause browsers to render text as italics? a. <text style = “italics”></text> b. <ital.></ital.> c. <i></i> d. <b></b> 6 The correct HTML code for inserting an image is : a. <img href=”image.gif”> b. <img> image.gif</gif> c. <image src = “image.gif”> d. <img src = “image.gif” > 7 Which attribute is NOT valid for the <body> tag? a. background b. color c. vlink d. bgcolor 8 ____________attribute is used to specify the location of an image file. a. alt b. src c. align d. name 9 Which of the following is NOT an example of Intellectual Property rights? a. Patent b. Trademark c. Password d. Industrial Design 10 The_________ attribute of <img> tag specifies an alternate text for an image, if the image cannot be displayed due to any reason. a. alt b. alternate c. tooltip d. text 11 While creating a Web document, which unit is used to express an image’s height and width? a. Centimeters b. Pixels c. Dots per inch d. Inches 12 Preeti needs to send a very confidential message to her colleague in office over a secure channel. She uses a technique wherein an actual message (which is in readable form) can be converted into an unreadable message. This concept is known as________________ a. Encryption b. Decryption c. Plagiarism d. Data Security. 13 Which is the correct way to comment out something in HTML? a. Using ## and # b. Using <!-- and --> c. Using </-- and -/-> d. Using <!-- and -!> 14 The default alignment of images, that are inserted in Web page, is: a. left b. right c. inline with text d. middle 15 Which of the following techniques can be used for security of data? a. Authentication b. Authorisation c. Encryption d. All of the Above 16 Which of the following is not a cybercrime? a. Plagiarism b. Phishing c. using licensed software d. hacking 17 _________ is a software for which exclusive rights of modification in the source code remain with the owner. a. Free Open-Source Software b. Freeware c. Open-Source Software d. Proprietary Software 18. A _______________ is the right given by the government to an inventor to protect his/ her invention from being used/copied for a fixed period of time. a. Copyright b. Intellectual Property c. Patent d. Trademark 19 Which of these is NOT an attribute of the font tag? a. color b. face c. type d. size 20 The <_________> tag displays text in subscript form. a. sub b. sup c. sups d. subs. Section-B This section contains 20 questions. Answer any 16 questions. 21 Arun clicks on a link received in a message on his phone which promises him a complimentary trip to a destination of his choice. He forwarded this message to his friend, Panshul and asked him to do the same. But Panshul refuses and tells Arun that his personal and private information, such as online account names, login information and passwords can be stolen and he should be careful of such ____________ attacks. a. Phishing b. Spamming c. Scamming d. Plagiarism 22 Consider the following HTML code: <ol type='i'> <li>First</li> <li>Second</li> <li>Third</li> <li>Fourth</li> </ol> Choose the correct output that would be shown upon execution of the above code , from the choices given below: a. b. c. d. 23 Charlene is an artist. She displays her artwork on the Internet using her website to attract buyers. One day while browsing the Internet she discovers that another artist has displayed her painting portraying it as his own. Which right of Charlene was infringed? a. Digital Privacy right b. Intellectual Property right c. Digital Property right c. Intellectual Privacy right 24 Which of the following will result in the largest text size? a. <H3> b. <H6> c. <H2> d. <H4> 25 We can create a numbered list using the __________ tag. a. <UL> b. <list> c. <OL> d. <DL> 26 Which of these is NOT an example of Cyber bullying? a. Copying a classmate’s personal photo against his/her permission from his social media account and sending it to other friends on their emails b. Bullying a classmate in the school corridor. c. Threatening someone on whatsapp. d. Posting mean messages about someone on their social media. 27 Identify which of the following type of list will create a bulleted list. a. Unordered b. Ordered c. Definition d. Numbered I. First II. Second III. Third IV. Fourth i. First ii. Second iii. Third iv. Fourth I First II Second III Third IV Fourth i First ii Second iii Third iv Fourth Page 5 Sample Question Paper (Term 1) Class: X Session: 2021-22 Computer Applications (Code 165) Maximum Marks: 25 Time Allowed: 90 Minutes General Instructions: 1. The Question Paper contains three sections A, B and C. 2. Section A has 20 questions. Attempt any 16 questions. 3. Section B has 20 questions. Attempt any 16 questions. 4. Section C has 10 questions. Attempt any 8 questions. 5. All questions carry equal marks. 6. There is no negative marking. Q.N. Section-A This section consists of 20 questions of MCQ type. Answer any 16 questions. 1 Which one of the following software comes under Open-Source Software category? a. Photoshop b. Ms-Paint c. Linux d. Windows 2 HTML tag to draw horizontal line: a. <hl> b. <hr> c. <hline> d. None of the above 3 Secure data transmission means a) Data is accessible by any unauthorized person during transmission. b) Data can not be accessed by any unauthorized person during transmission. c) Transmission of data happens easily d) Noone can access it 4 The correct HTML code to display(P+Q) 2 is: a. <SUB>(P+) 2</SUB> b. P+Q <SUP> 2 </SUP> c. ( P + Q)<SUP> 2 </SUP> d. <SUP> (P+Q) 2</SUP> 5 Which HTML tags cause browsers to render text as italics? a. <text style = “italics”></text> b. <ital.></ital.> c. <i></i> d. <b></b> 6 The correct HTML code for inserting an image is : a. <img href=”image.gif”> b. <img> image.gif</gif> c. <image src = “image.gif”> d. <img src = “image.gif” > 7 Which attribute is NOT valid for the <body> tag? a. background b. color c. vlink d. bgcolor 8 ____________attribute is used to specify the location of an image file. a. alt b. src c. align d. name 9 Which of the following is NOT an example of Intellectual Property rights? a. Patent b. Trademark c. Password d. Industrial Design 10 The_________ attribute of <img> tag specifies an alternate text for an image, if the image cannot be displayed due to any reason. a. alt b. alternate c. tooltip d. text 11 While creating a Web document, which unit is used to express an image’s height and width? a. Centimeters b. Pixels c. Dots per inch d. Inches 12 Preeti needs to send a very confidential message to her colleague in office over a secure channel. She uses a technique wherein an actual message (which is in readable form) can be converted into an unreadable message. This concept is known as________________ a. Encryption b. Decryption c. Plagiarism d. Data Security. 13 Which is the correct way to comment out something in HTML? a. Using ## and # b. Using <!-- and --> c. Using </-- and -/-> d. Using <!-- and -!> 14 The default alignment of images, that are inserted in Web page, is: a. left b. right c. inline with text d. middle 15 Which of the following techniques can be used for security of data? a. Authentication b. Authorisation c. Encryption d. All of the Above 16 Which of the following is not a cybercrime? a. Plagiarism b. Phishing c. using licensed software d. hacking 17 _________ is a software for which exclusive rights of modification in the source code remain with the owner. a. Free Open-Source Software b. Freeware c. Open-Source Software d. Proprietary Software 18. A _______________ is the right given by the government to an inventor to protect his/ her invention from being used/copied for a fixed period of time. a. Copyright b. Intellectual Property c. Patent d. Trademark 19 Which of these is NOT an attribute of the font tag? a. color b. face c. type d. size 20 The <_________> tag displays text in subscript form. a. sub b. sup c. sups d. subs. Section-B This section contains 20 questions. Answer any 16 questions. 21 Arun clicks on a link received in a message on his phone which promises him a complimentary trip to a destination of his choice. He forwarded this message to his friend, Panshul and asked him to do the same. But Panshul refuses and tells Arun that his personal and private information, such as online account names, login information and passwords can be stolen and he should be careful of such ____________ attacks. a. Phishing b. Spamming c. Scamming d. Plagiarism 22 Consider the following HTML code: <ol type='i'> <li>First</li> <li>Second</li> <li>Third</li> <li>Fourth</li> </ol> Choose the correct output that would be shown upon execution of the above code , from the choices given below: a. b. c. d. 23 Charlene is an artist. She displays her artwork on the Internet using her website to attract buyers. One day while browsing the Internet she discovers that another artist has displayed her painting portraying it as his own. Which right of Charlene was infringed? a. Digital Privacy right b. Intellectual Property right c. Digital Property right c. Intellectual Privacy right 24 Which of the following will result in the largest text size? a. <H3> b. <H6> c. <H2> d. <H4> 25 We can create a numbered list using the __________ tag. a. <UL> b. <list> c. <OL> d. <DL> 26 Which of these is NOT an example of Cyber bullying? a. Copying a classmate’s personal photo against his/her permission from his social media account and sending it to other friends on their emails b. Bullying a classmate in the school corridor. c. Threatening someone on whatsapp. d. Posting mean messages about someone on their social media. 27 Identify which of the following type of list will create a bulleted list. a. Unordered b. Ordered c. Definition d. Numbered I. First II. Second III. Third IV. Fourth i. First ii. Second iii. Third iv. Fourth I First II Second III Third IV Fourth i First ii Second iii Third iv Fourth 28 Which sequence of HTML tags is correct? a. <html><head><title></title></head><body></body></html> b. <html><head><title><body></title></head></body></html> c. <html><head><title</head><body></body>></title></</html> d. <html><head><title><body></body ></title></head ></html> 29 Pratham is excited to use a new software which is freely available to download but he cannot modify or change the source code. Pratham is using a. Freeware b. Open-Source Software c. Both a and b d. None of the above 30 Priyanshu has written the following code snippet as part pf an HTML program. <B> Mystery Moon </B> Predict the output of the above from the following: a. Mystery Moon b. Mystery Moon c. Mystery Moon d. Mystery Moon 31 Consider the following code: <img src="Computers.jpg" width=" ________ " height="________”> Fill in the blanks to set the image size to be 250pixels wide and 400 pixels tall. a. 250, 400 b.400, 250 c. <250><400> d. <400><250> 32 Tag (s) required to create Description lists in HTML: a. <DL> b. <DT> c. <DD> d. All of the above 33 Which of the following is NOT a reason for the digital divide in different demographic regions? a. Cost of Technology b. Lack of information c. Lack of access to high performance computers d. Lack of access to the disabled.Read More
303 docs|7 tests
|
|
Explore Courses for Class 10 exam
|